Analysis

  • max time kernel
    148s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    11-10-2021 23:33

General

  • Target

    https://edgeworkflow11.azurefd.net/auth/supplier.html?X-OpenDNS-Session=*EMAIL%20ADDRESS%20REMOVED

  • Sample

    211011-3jxfdsaear

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://edgeworkflow11.azurefd.net/auth/supplier.html?X-OpenDNS-Session=*EMAIL%20ADDRESS%20REMOVED
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1456 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3148

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177
    MD5

    a7963915d5bb0664352fad9efe5af666

    SHA1

    75cb2172c968a9bdbea947ff82edafc2e122b8d4

    SHA256

    80cc7b3367b0aeb0d1837a6048dd5b19faf534f27eadfd6a4387421706558490

    SHA512

    4c768aebc3feccf22edf867be25fc0c245c60611d4d0b4d10d02b723b4cae5b6e93ed7cb2e84b158cb0d3ae6895810f4e3abdae84fb8fa37cdffce4aae3f4744

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177
    MD5

    e274632ec0cd71e5c11fd9410ddb0859

    SHA1

    cc783d3a10fa98d03070bb0b58ef0f86fc4b101b

    SHA256

    8b5b8b1eaf8e7e1dd658754d97d8b958cc080f36150956e67848863d230031c6

    SHA512

    578c6c60e8f2ca01b902247123c10fbaf9be479406cd16130128717c269e10847daf557f94c362ab1ed2804936bdde59a5352f6985a8796e8b78726bf93b8a3c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\0F9IMCE8.cookie
    MD5

    d84a35849b2352abf72f5eecae15ae30

    SHA1

    369f680571607eed13c64a8997ddf2178b57c71f

    SHA256

    0a519126a0e21996042a56501fcaaa6524bfd13c8f6da857b9d2013fed7145f2

    SHA512

    b52a99ec9ea41ecf3b10a1bbe184ed563bd15552556d5a96f987abffb6810e7f3df8a61499a1f9f84cc8d42e056c60ed43243ac07c3c9b0e9bddeb1da753c004

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\0SX04KJE.cookie
    MD5

    bc3ed66ef3151e720b61b38c4921615b

    SHA1

    116102399cea0d9f070219fc549a90a5e707c60d

    SHA256

    16152fcb172bec1f68c411f02909de907e081bf658eb90ddf49e618958af8744

    SHA512

    c9d47ccfac34fd969f5ee88e3e5a9e0267cc945d7b75b0cb725214254cf78f802e5af7c96563457eff60d532a8454ecdaad300c3fd9872dd9162676dc069fa6a

  • memory/1456-141-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-123-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-121-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-146-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-122-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-124-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-126-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-127-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-128-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-130-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-132-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-133-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-134-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-135-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-136-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-149-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-115-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-140-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-114-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-143-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-116-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-120-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-137-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-148-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-150-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-154-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-155-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-156-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-162-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-163-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-164-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-165-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-166-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-167-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-168-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-172-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-174-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-177-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-178-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-119-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-118-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/1456-144-0x00007FF8B5CD0000-0x00007FF8B5D3B000-memory.dmp
    Filesize

    428KB

  • memory/3148-139-0x0000000000000000-mapping.dmp